The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Post
by
Vikash
Abraham,
Product
Marketing
Manager
for
IBM
Security
Solutions
While
Cloud
has
been
clearly
identified
as
the
next
step
to
IT
optimization,
essential
for
increased
performance
and
cost
reduction,
many
of
us
are
in
a
haze
when
it
comes
to
the
fundamental
security
measures
required.
Our
fears
related
to
cloud
... [ + Read more ]

This
post
is
contributed
by
Glinda
Cummings,
WW
Senior
IBM
Security
Solutions
Product
Manager
for
zSecure
Remember
the
good
old
days
when
we
did
our
work
from
a
dumb
terminal,
or
worked
remotely
on
the
mainframe?
Then
came
the
personal
computer
with
computing
power
at
your
fingertips
from
just
about
anywhere
... [ + Read more ]

XSS
vulnerabilities
and
security
technology
that
thinks
more
like
you
Learning
about
the
world
around
us
and
then
modifying
our
opinions
and
actions
as
we
learn
more
is
a
skill
that
we
aspire
to
teach
in
every
classroom,
and
it
is
a
process
that
informs
how
we
think
... [ + Read more ]

This
post
is
written
by
Anne
Lescher,
Product
Marketing
Manager
with
IBM
Security
Solutions.
It
seems
like
everyone
is
rushing
to
keep
up
with
the
latest
IT
innovations
supporting
our
business
operations.
There
is
pressure
to
implement
hot
new
state-of-the-art
technologies
supporting
BYOD
(Bring
Your
Own
Device),
cloud
computing,
mobile
applications,
... [ + Read more ]

You
may
have
‘Big
Data’
and
not
know
it…
can
you
protect
it?
To
many
security
executives
the
word
“Big
Data”
seems
to
being
something
that
someone
else
has
and
thus
not
applicable
to
ones
own
enterprise.
Many
Security
managers
assume
that
their
own
data-center
is
traditional
and
that
... [ + Read more ]

NEW!
IBM
X-Force
2012
Annual
Trend
and
Risk
ReportTwice
a
year
since
the
late
1990s,
IBM’s
X-Force
Research
and
Development
team
releases
a
trend
and
risk
report
including
content
collected
from
dozens
of
thought
leaders
across
the
company.
Its
findings,
analyses
and
predictions
come
from
working
with
our
thousands
of
... [ + Read more ]

This
post
is
contributed
by
Tajunnisa
Kamalapuram,
Marketing
Manager
-
IBM
Security
Solutions.
Today's
users
want
to
access
information
whenever
they
wish
and
wherever
they
happen
to
be,
prefer
to
use
their
favorite
device
for
both
corporate
and
personal
activities.
Customers
want
access
to
your
network
or
your
cloud
to
make
... [ + Read more ]

This
post
is
written
by
Archit
Lohokare,
Product
Manager
for
IBM
Security
Systems.
By
now,
Matt
Honan’s
nightmarish
experience
of
his
accounts
being
hacked
has
been
echoed
by
many
other
individuals
who’ve
faced
similar
disruptions
to
their
online
lives.
Matt’s
twitter
account
was
even
used
as
a
platform
to
broadcast
... [ + Read more ]

This
post
was
written
by
Glinda
Cummings,
World
Wide
Senior
Product
Manager,
zSecure
at
IBM.
When
it
comes
to
enterprise
security,
no
news
is
not
necessarily
good
news.
A
lack
of
alerts
about
attempts
to
attack
your
system
doesn’t
mean
they
didn’t
happen—because
chances
are,
they
did.
Many
large
organizations
... [ + Read more ]

This
post
is
contributed
by
Darren
Argyle,
World
Wide
Security
Solutions
Market
Leader.
After
nearly
falling
asleep
at
the
wheel
of
my
car
one
evening
and
narrowly
avoiding
slamming
into
a
wall,
I
was
reminded
of
just
how
important
having
good
brakes
on
my
car
is.
When
we
consider
safety
on
... [ + Read more ]

This
post
was
contributed
by
Richard
Mayo,
WW
Product
Marketing
Manager
-
Tivoli
Endpoint
Manager.
Just
a
few
years
ago
the
endpoint
management
domain
was
most
PCs
and
laptops.
Now
multiple
forces
are
at
work,
driving
IT
to
manage
a
plethora
of
new
endpoints.
The
most
obvious
examples
are
mobile
endpoints
... [ + Read more ]

This
post
is
courtesy
of
Ronnie
Shelley,
IAM
Segment
Manager
for
IBM
Security.
In
the
next
three
years,
IBM
anticipates
that
clients
will
increase
the
pace
of
cloud
implementations
by
215%.
This
forecast
illustrates
exceptional
interest
in
and
organizations’
growing
acceptance
of
cloud
computing.
Part
of
this
acceptance
hinges
on
... [ + Read more ]

This
post
is
contributed
by
Kim
Madia,
World
Wide
Product
Marketing
Manager
for
Infosphere.
Working
at
IBM,
I
have
been
fortunate
enough
to
be
a
part
of
launching
big
data
platforms
to
clients.
Big
data
is
more
than
simply
a
matter
of
size;
it
is
an
opportunity
to
find
insights
... [ + Read more ]

This
post
was
written
by
Anne
Lescher,
Product
Marketing
Manager
with
IBM
Security
Solutions.
One
of
the
biggest
challenges
is
protecting
sensitive
information,
and
one
of
the
biggest
fears
is
losing
that
information
to
hackers.
Who
has
not
worried
about
losing
a
backup
tape
or
disc
that
holds
millions
... [ + Read more ]

This
post
was
contributed
by
Brian
Fitch,
Product
Manager
for
Network
Protection.
The
Tolly
Group
has
just
released
a
security
efficacy
report
on
the
IBM
Security
Network
IPS
GX7800.
The
GX7800
was
compared
to
open
source
SNORT
version
2.9.3.1
and
the
latest
(as
of
the
time
of
testing)
Sourcefire
VRT
(Vulnerability
... [ + Read more ]